Feeds

Microsoft architecture chief: Google Wave 'anti-web'

Email-IM hybrid 'too complicated'

The essential guide to IT transformation

Exchange of ideas

A year ago, Ozzie assumed Microsoft's mantle of technology leadership previously worn by Bill Gates. So naturally he feels the direction he has outlined for the company is superior to that of the competition.

But unlike the Lotus or Groove days, Ozzie is dealing with an organization with a vast and complex mix of products on PCs and servers, which he must also work with. Also Microsoft is trying to make some software partly available from the cloud - it is building versions of Exchange and SharePoint to run as hosted services on Azure.

"What excites me more [than Azure] is in the online Exchange services," Ozzie said. "A year to a year-and-a-half ago when we stated talking about this with customers, partners and integrators they didn't understand why they wanted to do this. Now partners are building practices around this."

You still need to buy into the Microsoft SQL Server architecture, for all Ozzie's talk of the complexity of Wave and the implied openness of things like Mesh and the Exchange and SharePoint services. Azure's storage system, for instance, is based on Microsoft's SQL Server. Also, you'll still be building applications for Azure and all those Microsoft services using Microsoft's Visual Studio and relying on .NET.

Google Wave makes use of technologies that exist outside the company, such as Extensible Messaging and Presence Protocol (XMPP) for federated, real-time collaboration in the Google Wave Federation Protocol and Javascript to build gadgets.

But Wave has its own issues, namely that the machine-to-machine currently only uses Google's App Engine, instead of other containers. Also, it seems that apps you want to integrate with Wave will need to use Javascript, which is noted for its simplicity and - at the same time - complexity.

In a way, this is classic Microsoft meets what is emerging as classic Google. Microsoft gives you an integrated stack but all the moving parts are anchored on a single company's vision. Google frees you to work out the bits yourself, but you must rely on your own smarts or those of your chosen tools.

"I hope we learn a lot as an industry from Wave," according to Ozzie - who has clearly placed his bets. "We will learn whether users want to think about a holistic experience versus keeping email separate from IM from workspaces. We learned a lot from Notes. Everybody who tries to come into this space learns a lot."

You can see more from Ozzie here. ®

Secure remote control for conventional and virtual desktops

More from The Register

next story
BBC: We're going to slip CODING into kids' TV
Pureed-carrot-in-ice cream C++ surprise
China: You, Microsoft. Office-Windows 'compatibility'. You have 20 days to explain
Told to cough up more details as antitrust probe goes deeper
Linux turns 23 and Linus Torvalds celebrates as only he can
No, not with swearing, but by controlling the release cycle
Scratched PC-dispatch patch patched, hatched in batch rematch
Windows security update fixed after triggering blue screens (and screams) of death
This is how I set about making a fortune with my own startup
Would you leave your well-paid job to chase your dream?
prev story

Whitepapers

Endpoint data privacy in the cloud is easier than you think
Innovations in encryption and storage resolve issues of data privacy and key requirements for companies to look for in a solution.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Advanced data protection for your virtualized environments
Find a natural fit for optimizing protection for the often resource-constrained data protection process found in virtual environments.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.